|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1338158471 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
220802s2022 caua o 000 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d OCLCQ
|d OCLCO
|
020 |
|
|
|z 9781098134976
|
029 |
1 |
|
|a AU@
|b 000072345626
|
035 |
|
|
|a (OCoLC)1338158471
|
037 |
|
|
|a 9781098134983
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20220802
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Baum, David,
|e author.
|
245 |
1 |
0 |
|a Deploying a modern security data lake /
|c by David Baum.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media, Inc.,
|c 2022.
|
300 |
|
|
|a 1 online resource (45 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Cybersecurity experts are overwhelmed, constantly on guard against malicious activity on their networks. Further complicating these external assaults are internal risks arising from simple errors, disgruntled employees, and outdated software configurations. Security experts today must act on the assumption that all applications, services, identities, and networks are under threat. This report examines how security data lakes can complement or replace the traditional SIEM model. Author David Baum describes how to deploy a modern security data lake, using your organization's existing cloud data platform to deliver comprehensive visibility and powerful automation across multiple security use cases. Heads of cybersecurity, security operations, and data science will learn how to deliver comprehensive visibility and powerful automation across multiple security use cases.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781098134983/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|